Flexible cryptographic access control through proxy re-encryption between groups.
Gaurav PareekB. R. PurushothamaPublished in: ICDCN (2019)
Keyphrases
- access control
- proxy re encryption
- security model
- public key encryption
- fine grained
- high assurance
- dynamic access control
- data security
- security requirements
- encryption scheme
- smart card
- security policies
- role based access control
- security mechanisms
- standard model
- access control policies
- protection schemes
- security analysis
- ciphertext
- keyword search
- access control models
- access control mechanism
- public key
- access control systems
- digital signature
- rbac model